If you follow the Twitter thread, the secure boot password was stored as a SHA-1 hash. So someone eventually brute forced it, and it's "N%(dU32p'".<p>But, the prisons can't just change the default, because the design is that it writes the bios setup, including the default password, back to the device at power down.<p>So, there didn't really appear to be any other option for the prisons other than collecting them all and sending them back for a fairly big update.